Alexa Voice Purchasing Beta Program Policies

As provided in the Merchant Agreement, your participation in the Program is subject to these Program Policies (as modified from time to time by Amazon), and apply to any changes we make to the Program through our rights set forth in the Merchant Agreement. Capitalized terms used but not defined in these Program Policies have the meanings given to them in the Agreement.

SERVICES; MERCHANT AND PRODUCT INFORMATION

Services

As described in this Agreement, you are solely responsible for all aspects of Your Products and Services, including, without limitation, the fulfillment, delivery, customer service, payment processing and collection of orders submitted through your Site.

Amazon’s sole obligations in connection with the Program are set forth in Section 1 of the Merchant Agreement and the license grant to the Program Materials as further described below.

Merchant Information

Upon our request, you must review and verify, for each of your participating Merchant Locations, your (or your business’s) legal name, address, phone number, and e-mail address. You will timely provide us with any information that we reasonably request to verify your compliance with the Agreement.

Product Descriptions

As described in this Agreement, you are solely responsible for all aspects of Your Products and Services, including, without limitation, the fulfillment, delivery, customer service, payment processing and collection of orders submitted through your Site.

Amazon’s sole obligations in connection with the Program are set forth in Section 1 of the Merchant Agreement and the license grant to the Program Materials as further described below.

PROGRAM MATERIALS POLICY

Subject to your compliance with the Agreement, we grant you a limited, revocable, non-transferable, non- sublicensable, non-exclusive, royalty-free license during the Term to access, use, and reproduce the Program Materials that we may make available to you solely as necessary for your participation in the Program. Any license granted to you in connection with the Agreement will immediately and automatically terminate (i) upon termination of the Agreement or (ii) if you do not comply with any term or condition of the Agreement.

You will not, and will not authorize any other party to, do any of the following with the Program Materials, or any technology, system, or network used to operate or make available the Program: (a) reverse engineer, decompile, or disassemble them except to the extent applicable law expressly permits it despite this limitation; (b) modify or create derivative works based upon them in whole or in part; (c) distribute, sublicense, or otherwise provide any portion of them to, or allow access by, any third party; (d) remove any proprietary notices or labels; (e) use them with any software that is licensed under terms that would require that they be disclosed, licensed, distributed, or otherwise made available to any third party; (f) resell, lease, rent, transfer, sublicense, or otherwise transfer rights to any third party; (g) access or use them in a way intended to avoid incurring any applicable fees, exceeding usage limits or quota, or developing a product or service; or (h) take any action that would result in the introduction of viruses, Trojan horses, worms, or any other malicious, harmful, or deleterious programs.

You will take appropriate technical and organizational measures to protect against unauthorized or unlawful use of the Program Materials and against accidental loss or destruction of, or damage to them. You will provide us with notice immediately if you believe any unauthorized third party may be accessing or using the Program Materials. You are solely responsible for the access, development, content, operation, security, and maintenance of all Your Materials, and for properly configuring Your Materials and using the Program Materials (if applicable) and taking your own steps to maintain appropriate security, protection, and backup of Your Materials, including using encryption technology to protect them from unauthorized access and routinely archiving them. We are not responsible for any unauthorized access to, alteration of, or the deletion, destruction, damage, loss, or failure to store any of Your Materials (including as a result of your or any third party’s errors, acts, or omissions).

Except for the rights explicitly granted to you in the Agreement, all right, title, and interest (including all intellectual property and proprietary rights) in and to the Program Materials, and any other intellectual property and technology that we provide, make available, or use in connection with the Program are reserved and retained by us and our licensors. We may modify or discontinue (including by ceasing our distribution of or support for) any or all of the Program Materials at any time without notice. This paragraph will survive termination of the Agreement.

The Program Materials may include or be distributed with software or other materials that are provided under a separate license agreement (such as an open source license), and that separate license will govern the use of such software or other materials in event of a conflict with the Agreement. Any such separate license agreement may be indicated in the license, notice, or readme files distributed with the applicable software or other materials or in related documentation.

Customer Experience

Amazon obsesses over providing our customers the best possible experience. We measure customer experience in a number of ways, including the availability of Your Products and Services, prices, promotions and incentives offered. We may choose not to display your Products and Services through our Program if you do not meet Amazon’s customer experience bar, in our sole discretion. You will not be in violation of this policy to the extent Program functionality limitations prevent you from meeting your obligations.

OPERATIONAL RESPONSIBILITIES POLICY

General Responsibilities

In addition to the obligations described in the Agreement, to the extent not prohibited by applicable laws, You will and will cause your Personnel to: (a) comply with policies that we may designate and, upon request, provide us with reports (in a form designated by us) certifying to your compliance with these requirements; (b) use Confidential Information made available to you solely for the purpose of communicating with Purchasers of Your Products and Services; (c) not in any way represent to Purchasers that you or Your Personnel are Amazon or that you or Your Personnel are acting on behalf of Amazon; and (d) comply with all other requirements designated by Amazon.

Data Protection Policy

The Data Protection Policy (“DPP”) governs the treatment (e.g., receipt, storage, usage, transfer, and disposition) of Amazon Information. “Amazon Information” is any information provided to you in connection with the Program, including through APIs.

General Security Requirements
Consistent with industry-leading security standards and other requirements specified by Amazon based on the classification and sensitivity of Amazon Information, you will maintain physical, administrative, and technical safeguards, and other security measures (i) to maintain the security and confidentiality of Amazon Information accessed, collected, used, stored, or transmitted by you, and (ii) to protect that information from known or reasonably anticipated threats or hazards to its security and integrity, accidental loss, alteration, disclosure, and all other unlawful forms of processing. Without limitation, you will comply with the following requirements:

Network Protection. You will install and maintain a working network firewall to protect data accessible via the Internet and will keep all Amazon Information protected by the firewall at all times.

Updates. You will keep your systems and software up-to-date with the latest upgrades, updates, bug fixes, new versions and other modifications necessary to ensure security of the Amazon Information.

Anti-malware. You will at all times use anti-malware software and will keep the anti-malware software up to date. You will mitigate threats from all viruses, spyware, and other malicious code that are or should reasonably have been detected.

Encryption. You will encrypt data at rest and data sent across open networks in accordance with industry best practices.

Testing. You will regularly test your security systems and processes to ensure they meet the requirements of this Data Protection Policy.

Access Management. You will assign a unique ID to each person with computer access to Amazon Information. You will restrict access to Amazon Information to only those people with a “need-to-know” for purposes of your participation in the Program. You will review the list of people and services with access to Amazon Information on a regular basis (at least quarterly) and remove accounts that no longer require access. You will not create or use generic, shared, or default login credentials or user accounts. You will mandate and ensure the use of system enforced “strong passwords” in accordance with industry-standard best practices on all systems that have control of or access to Amazon Information. You will maintain and enforce “account lockout” by disabling accounts with access to Amazon Information when an account exceeds more than ten consecutive incorrect password attempts. Except where expressly authorized by Amazon in writing, you will isolate Amazon Information at all times (including in storage, processing or transmission), from your and any third-party information.

Security Incidents. You will inform Amazon within 24 hours of detecting any Security Incident. “Security Incident” is any actual or suspected unauthorized access, collection, acquisition, use, transmission, disclosure, corruption or loss of Amazon Information, or breach of any environment (i) containing Amazon Information or (ii) managed by you with controls substantially similar to those protecting Amazon Information. You will remedy each Security Incident in a timely manner and provide Amazon written details regarding your internal investigation regarding each Security Incident. You will cooperate and work together with Amazon to formulate and execute a plan to rectify all confirmed Security Incidents. You will inform Amazon within 24 hours when its data is being sought in response to legal process or by applicable law (e.g., 18 U.S.C. §2705(b)).

Request for Deletion or Return. You must promptly (but within no more than 72 hours after Amazon's request), permanently and securely delete (in accordance with industry-standard sanitization processes, e.g., NIST 800-88) or return Amazon Information upon and in accordance with Amazon's notice requiring deletion or return. You must also permanently and securely delete all live (online or network accessible) instances of Amazon Information within 90 days after Amazon's notice. If requested by Amazon, you will certify in writing that all Amazon Information has been securely destroyed.

Security Policy. You will maintain and enforce an information and network security policy for employees, subcontractors, agents, and suppliers that meets the standards set out in this policy, including methods to detect and log policy violations.

Logging and Monitoring. You will maintain and regularly review detailed access logs for purposes of detecting malicious behavior or unauthorized access. You will provide access to these logs to upon Amazon’s request following any Security Incident.

Security Review. Upon Amazon’s written request, you will certify in writing to Amazon that you are in compliance with this policy. Amazon reserves the right to periodically review the security of systems that you use to process Amazon Information. You will cooperate and provide Amazon with all required information within a reasonable timeframe, but no more than 20 calendar days from the date of Amazon’s request. If any security review identifies any deficiencies, you will, at your sole cost and expense, take all actions necessary to remediate those deficiencies within an agreed upon timeframe.